SlideShare ist ein Scribd-Unternehmen logo
1 von 20
SALEH ALGHAMDI-N26846627
 VO HONG HANH –N7704283
   Introduction
    ◦ Scope
    ◦ Definition of key terms
   History of cloud computing
   Cloud service models
   Cloud deployment models
   Advantages of cloud computing
   Issues
    ◦ Privacy and security
       Confidentiality
       Integrity
       Availability
    ◦ Laws and regulations
   Recommendations                 This image is taken from
                                    http://www.itp.net/584104-gartner-warns-of-
                                    cloud-service-contract-risks
   Cloud computing – a technology that provides web-based solutions and
      services to the public using networks, servers, data warehouses‟, software
      applications and internet services managed by a third party (Giard &
      Lessard, 2010).
     Nowadays, cloud-based services are being adopted by organisations at a
      rapid rate.
     Web 2.0 tools, social networking sites are all examples in which individuals
      are moving their activities to „the cloud‟
     In 2010, Gartner predicted that cloud-based services generated more than
      $68 billion in worldwide revenue (Mielke, 2010).




This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the-
cloud-ieee/
History of cloud computing
   Back to the 1960s, computer scientist John McCarthy wrote that “computation
    may someday be organized as a public utility”
   In 1997, the term was used for the first time in its current context by lecturer
    Ramnath Chellappa who defined it as a new “computing paradigm where the
    boundaries of computing will be determined by economic rationale rather
    than technical limits alone” (Biswas-a, 2011).
   In 1999, Salesforce.com - one of the first movers in cloud
    computing, introduced the concept of delivering enterprise applications via a
    website.
   Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs
    in 2006
   In 2007, an industry-wide collaboration between Google, IBM and a number
    of universities across the United States soon followed.
   Microsoft‟s entry into cloud computing came in 2009 with the launch of
    Windows Azure
                                                        (Biswas, 2011)
Cloud service types

There are 3 major models for cloud computing which are:

   Infrastructure as a Service (IaaS)
   Platform as a Service (PaaS)
   Software as a Service (SaaS).




                              This image is taken from:
                              http://www.maintec.com/blog/cloud-computing-demystified/ /
IAAS

IAAS – Infrastructure as a Service

   IaaS involves physical computer hardware such as CPU
    processing, memory, data storage and network connectivity being provided
    by a vendor.
   Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).
   According to In-Stat, it is expected that IaaS spending will approach $4 billion
    from 2011 to 2014
PAAS

PAAS –Platform as a Service

   PaaS enables customers to use the vendor‟s cloud infrastructure to deploy
    web applications and other software developed by the customer using
    programming languages supported by the vendor .
   Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic
    Beanstalk and Microsoft Windows Auzre platform.
   According to In-Stat, PaaS spending will increase 113 percent annually to
    approximately $460 million in 2014.
SAAS

SAAS – Software as a service

   The strongest cloud trend and services
   The Application itself is provided by the service provider.
   Examples: Google doc, Gmail, Hotmail, Flickr
    From 2011 to 2014, SaaS spending is expected to grow 112 percent
    annually.
Cloud deployment models




  This image is taken from:
  https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_
  Framework
Public cloud

   The service are provided to the client from a third party service provider
    through the Internet.
    Public clouds have a maximum potential in cost efficiencies
   Security risks must be concerned
   Examples: Amazon




                              This image is taken from:
                              http://www.definethecloud.net/tag/public-cloud/
Private cloud

   A private cloud involves an organisation‟s exclusive use of cloud
    infrastructure and services located on premises or offsite which is then
    managed by the organisation or a selected vendor.
   Reduced potential security concerns
   Examples: HP Data Centers




                             This image is taken from:
                             http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons-
                             picking-the-right-cloud/
Hybrid cloud

   Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and
    most of the economic benefits of a public cloud.




                                     This image is taken from:
                                     http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily-
                                     with-newscale-rpath-and-eucalyptus/
Cloud computing advantages

•   Cost savings
•   No maintenance issues
•   Simplicity




                        This image is taken from
                        http://www.dailyblogging.org/internet/cloud-computing-advantages/
Cloud computing issues
     Security/Privacy                      Laws and regulations




This image is taken from
http://www.gfi.com/blog/cloud-computing-
security-implications-service-provider/    This image is taken from
                                           http://www.gfi.com/blog/cloud-computing-
                                           security-implications-service-provider/
Security/Privacy
1.     Confidentiality
privacy of information (Antonopoulos, et
al., 2010).


2.     Integrity
the authorisation to modify assets in the
cloud (Antonopoulos, et al., 2010).


3.     Availability
the availability of data when it is needed   This image is taken from
(Antonopoulos, et al., 2010).                http://www.gfi.com/blog/cloud-
                                             computing-security-implications-
                                             service-provider/
1- Confidentiality
The increased number of authorised parties to
access the cloud computing makes the data more
vulnerable to be compromised (Zissis, 2010). data
requires high algorithm encryption before it is
stored in the cloud. (Kalyani, Sonia, &
Paikrao, 2012).




                                  This image is taken from
                                  http://www.corporatecomplianceinsights.com/company/cipher
                                  cloud/
2- Integrity
Tampering QUT library data is most likely to cause daunting
damage. This issue is greater in the public cloud than it is in private
cloud. The private cloud is set up on private network, whereases;
the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private
cloud is more secure for QUT library.




                                    This image is taken from
                                    http://patricksclouds.wordpress.com/2011/06/09/if-the-
                                    private-cloud-benefits-the-public-cloud-economic-model/
3- Availability
cloud computing provider must be trusted party to deal with.
Trusted third party is the one that is fully compliant in its
financial, legal, and technical elements (Zissis, 2010). The
protection of intellectual property within „the cloud‟ for QUT
library should focus on creating a strong contract, ensuring
that the business retains the rights to all data stored within the
remote servers (LegalIQ, 2011).




        This image is taken from                This image is taken from
        http://www.techrepublic.com/blog/cio-   http://meship.com/Blog/2011/03/18/cloud-
        insights/cloud-computing-how-to-make-   computing-contracts-and-services-whats-
        the-right-choices/39747431              really-happening/
Laws and regulations
One feature of cloud computing is that data can be
localised, shared and stored in several countries, depending on
what the service provider decides. However, when QUT library opt
for cloud computing services, they relinquish all control over its
information (Giard & Lessard, 2010). Therefore, it is
recommended that contract specify the countries that the
information can be accessed and used from.




                              This image is taken from http://www.gfi.com/blog/cloud-computing-
                              security-implications-service-provider/
Recommendations for QUT library
1. Use complex algorithm encryption

2. Use the private cloud

3. Choose a trusted third party

4. Negotiate Service Level Agreement

5. In the contract, specify the countries in which the information can be
   accessed and used.




                                  This image is taken from
                                  http://www.tiptopcomputers.co.uk/recommendations.html

Weitere ähnliche Inhalte

Was ist angesagt?

A220113
A220113A220113
A220113irjes
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter9505567198
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security IssuesIJERA Editor
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstractelysiumtechnologies
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Seungyun Lee
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 

Was ist angesagt? (20)

Briefing 47
Briefing 47Briefing 47
Briefing 47
 
A220113
A220113A220113
A220113
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing and Security Issues
Cloud Computing and Security IssuesCloud Computing and Security Issues
Cloud Computing and Security Issues
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
B042306013
B042306013B042306013
B042306013
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
H046053944
H046053944H046053944
H046053944
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 

Ähnlich wie Slides 530 a2

The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technologyNIDHI SHARMA
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxaudeleypearl
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 

Ähnlich wie Slides 530 a2 (20)

Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
What is cloud computing technology
What is cloud computing technologyWhat is cloud computing technology
What is cloud computing technology
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docxResearch ArticleSecuring Cloud Hypervisors A Survey of the .docx
Research ArticleSecuring Cloud Hypervisors A Survey of the .docx
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
B017660813
B017660813B017660813
B017660813
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 

Kürzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Slides 530 a2

  • 1. SALEH ALGHAMDI-N26846627 VO HONG HANH –N7704283
  • 2. Introduction ◦ Scope ◦ Definition of key terms  History of cloud computing  Cloud service models  Cloud deployment models  Advantages of cloud computing  Issues ◦ Privacy and security  Confidentiality  Integrity  Availability ◦ Laws and regulations  Recommendations This image is taken from http://www.itp.net/584104-gartner-warns-of- cloud-service-contract-risks
  • 3. Cloud computing – a technology that provides web-based solutions and services to the public using networks, servers, data warehouses‟, software applications and internet services managed by a third party (Giard & Lessard, 2010).  Nowadays, cloud-based services are being adopted by organisations at a rapid rate.  Web 2.0 tools, social networking sites are all examples in which individuals are moving their activities to „the cloud‟  In 2010, Gartner predicted that cloud-based services generated more than $68 billion in worldwide revenue (Mielke, 2010). This image is taken from http://www.theindiagate.info/2011/04/regulations-for-the- cloud-ieee/
  • 4. History of cloud computing  Back to the 1960s, computer scientist John McCarthy wrote that “computation may someday be organized as a public utility”  In 1997, the term was used for the first time in its current context by lecturer Ramnath Chellappa who defined it as a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone” (Biswas-a, 2011).  In 1999, Salesforce.com - one of the first movers in cloud computing, introduced the concept of delivering enterprise applications via a website.  Amazon launched Amazon Web Service in 2002, Google launched GoogleDocs in 2006  In 2007, an industry-wide collaboration between Google, IBM and a number of universities across the United States soon followed.  Microsoft‟s entry into cloud computing came in 2009 with the launch of Windows Azure  (Biswas, 2011)
  • 5. Cloud service types There are 3 major models for cloud computing which are:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS). This image is taken from: http://www.maintec.com/blog/cloud-computing-demystified/ /
  • 6. IAAS IAAS – Infrastructure as a Service  IaaS involves physical computer hardware such as CPU processing, memory, data storage and network connectivity being provided by a vendor.  Example of an IaaS service vendor is Amazon Elastic Compute Cloud (EC2).  According to In-Stat, it is expected that IaaS spending will approach $4 billion from 2011 to 2014
  • 7. PAAS PAAS –Platform as a Service  PaaS enables customers to use the vendor‟s cloud infrastructure to deploy web applications and other software developed by the customer using programming languages supported by the vendor .  Example of PaaS vendors: Google App Engine, Amazon Web Services Elastic Beanstalk and Microsoft Windows Auzre platform.  According to In-Stat, PaaS spending will increase 113 percent annually to approximately $460 million in 2014.
  • 8. SAAS SAAS – Software as a service  The strongest cloud trend and services  The Application itself is provided by the service provider.  Examples: Google doc, Gmail, Hotmail, Flickr  From 2011 to 2014, SaaS spending is expected to grow 112 percent annually.
  • 9. Cloud deployment models This image is taken from: https://wiki.cloudsecurityalliance.org/guidance/index.php/Cloud_Computing_Architectural_ Framework
  • 10. Public cloud  The service are provided to the client from a third party service provider through the Internet.  Public clouds have a maximum potential in cost efficiencies  Security risks must be concerned  Examples: Amazon This image is taken from: http://www.definethecloud.net/tag/public-cloud/
  • 11. Private cloud  A private cloud involves an organisation‟s exclusive use of cloud infrastructure and services located on premises or offsite which is then managed by the organisation or a selected vendor.  Reduced potential security concerns  Examples: HP Data Centers This image is taken from: http://www.hightechdad.com/2012/01/31/a-cloud-for-all-seasons- picking-the-right-cloud/
  • 12. Hybrid cloud  Hybrid clouds attempt to obtain most of the security benefits of a private cloud, and most of the economic benefits of a public cloud. This image is taken from: http://www.cloudave.com/6/perform-the-hybrid-cloud-dance-easily- with-newscale-rpath-and-eucalyptus/
  • 13. Cloud computing advantages • Cost savings • No maintenance issues • Simplicity This image is taken from http://www.dailyblogging.org/internet/cloud-computing-advantages/
  • 14. Cloud computing issues Security/Privacy Laws and regulations This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/ This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 15. Security/Privacy 1. Confidentiality privacy of information (Antonopoulos, et al., 2010). 2. Integrity the authorisation to modify assets in the cloud (Antonopoulos, et al., 2010). 3. Availability the availability of data when it is needed This image is taken from (Antonopoulos, et al., 2010). http://www.gfi.com/blog/cloud- computing-security-implications- service-provider/
  • 16. 1- Confidentiality The increased number of authorised parties to access the cloud computing makes the data more vulnerable to be compromised (Zissis, 2010). data requires high algorithm encryption before it is stored in the cloud. (Kalyani, Sonia, & Paikrao, 2012). This image is taken from http://www.corporatecomplianceinsights.com/company/cipher cloud/
  • 17. 2- Integrity Tampering QUT library data is most likely to cause daunting damage. This issue is greater in the public cloud than it is in private cloud. The private cloud is set up on private network, whereases; the public cloud is off-site (Kuyoro, et al., 2011). Therefore, private cloud is more secure for QUT library. This image is taken from http://patricksclouds.wordpress.com/2011/06/09/if-the- private-cloud-benefits-the-public-cloud-economic-model/
  • 18. 3- Availability cloud computing provider must be trusted party to deal with. Trusted third party is the one that is fully compliant in its financial, legal, and technical elements (Zissis, 2010). The protection of intellectual property within „the cloud‟ for QUT library should focus on creating a strong contract, ensuring that the business retains the rights to all data stored within the remote servers (LegalIQ, 2011). This image is taken from This image is taken from http://www.techrepublic.com/blog/cio- http://meship.com/Blog/2011/03/18/cloud- insights/cloud-computing-how-to-make- computing-contracts-and-services-whats- the-right-choices/39747431 really-happening/
  • 19. Laws and regulations One feature of cloud computing is that data can be localised, shared and stored in several countries, depending on what the service provider decides. However, when QUT library opt for cloud computing services, they relinquish all control over its information (Giard & Lessard, 2010). Therefore, it is recommended that contract specify the countries that the information can be accessed and used from. This image is taken from http://www.gfi.com/blog/cloud-computing- security-implications-service-provider/
  • 20. Recommendations for QUT library 1. Use complex algorithm encryption 2. Use the private cloud 3. Choose a trusted third party 4. Negotiate Service Level Agreement 5. In the contract, specify the countries in which the information can be accessed and used. This image is taken from http://www.tiptopcomputers.co.uk/recommendations.html